Robust deployment strategy for security data collection agent

With the frequent occurrence of “network black production” incidents,attackers strategically launch target attacks with the idea of “profit-seeking”.Existing network monitoring systems lack accurate and effective monitoring strategies for “strategic attacks”.Therefore,in an adversarial environment,h...

Full description

Saved in:
Bibliographic Details
Main Authors: 陈黎丽, 王震, 郭云川, 华佳烽, 姚宇超, 李凤华
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2019-06-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019121/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539368587624448
author 陈黎丽
王震
郭云川
华佳烽
姚宇超
李凤华
author_facet 陈黎丽
王震
郭云川
华佳烽
姚宇超
李凤华
author_sort 陈黎丽
collection DOAJ
description With the frequent occurrence of “network black production” incidents,attackers strategically launch target attacks with the idea of “profit-seeking”.Existing network monitoring systems lack accurate and effective monitoring strategies for “strategic attacks”.Therefore,in an adversarial environment,how to optimize the deployment of collection agents for better monitoring results becomes an extremely important issue.Based on this,a robust deployment strategy of collection agents was proposed for the above mentioned problem.Firstly,the idea of attack-defense game was introduced to measure the collection agents,threat events and their relations,then the MADG model was built.Secondly,considering that the traditional accurate solution algorithm cannot solve the problem,the robust acquisition agent deployment algorithm called RCD algorithm was designed to approximate the problem by using the sub-module and non-growths of the objective function.Finally,the RCD algorithm was verified.The experimental results show that the above model and method is feasible,effective and expandable.
format Article
id doaj-art-9fd544af69d943c388d8989e13d2789e
institution Kabale University
issn 1000-436X
language zho
publishDate 2019-06-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-9fd544af69d943c388d8989e13d2789e2025-01-14T07:17:05ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2019-06-0140516559727511Robust deployment strategy for security data collection agent陈黎丽王震郭云川华佳烽姚宇超李凤华With the frequent occurrence of “network black production” incidents,attackers strategically launch target attacks with the idea of “profit-seeking”.Existing network monitoring systems lack accurate and effective monitoring strategies for “strategic attacks”.Therefore,in an adversarial environment,how to optimize the deployment of collection agents for better monitoring results becomes an extremely important issue.Based on this,a robust deployment strategy of collection agents was proposed for the above mentioned problem.Firstly,the idea of attack-defense game was introduced to measure the collection agents,threat events and their relations,then the MADG model was built.Secondly,considering that the traditional accurate solution algorithm cannot solve the problem,the robust acquisition agent deployment algorithm called RCD algorithm was designed to approximate the problem by using the sub-module and non-growths of the objective function.Finally,the RCD algorithm was verified.The experimental results show that the above model and method is feasible,effective and expandable.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019121/collection agentsecurity datadefender-attacker game theoryrobustdeployment strategy
spellingShingle 陈黎丽
王震
郭云川
华佳烽
姚宇超
李凤华
Robust deployment strategy for security data collection agent
Tongxin xuebao
collection agent
security data
defender-attacker game theory
robust
deployment strategy
title Robust deployment strategy for security data collection agent
title_full Robust deployment strategy for security data collection agent
title_fullStr Robust deployment strategy for security data collection agent
title_full_unstemmed Robust deployment strategy for security data collection agent
title_short Robust deployment strategy for security data collection agent
title_sort robust deployment strategy for security data collection agent
topic collection agent
security data
defender-attacker game theory
robust
deployment strategy
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019121/
work_keys_str_mv AT chénlílì robustdeploymentstrategyforsecuritydatacollectionagent
AT wángzhèn robustdeploymentstrategyforsecuritydatacollectionagent
AT guōyúnchuān robustdeploymentstrategyforsecuritydatacollectionagent
AT huájiāfēng robustdeploymentstrategyforsecuritydatacollectionagent
AT yáoyǔchāo robustdeploymentstrategyforsecuritydatacollectionagent
AT lǐfènghuá robustdeploymentstrategyforsecuritydatacollectionagent